Use Cases and Receipts
In this chapter, we will explore the best practices for working with the Tydids framework. Through practical examples and real-life scenarios, you will learn how to effectively use the frameworkâs validation and cryptographic processes. This chapter aims to equip you with the knowledge to seamlessly integrate Tydids into your projects, ensuring robust security and reliable performance.
Lending a drilling machine
In this scenario, Alice, a homeowner, wants to lend her drilling machine to Bob, a neighbor who...
Getting freelancer work signed off and paid
Alice works for a multinational corporation and needs to sign a new consulting agreement with...
How ACME Corp uses Self-Sovereign Identity (SSI) to give customers full control over their personal data
Showcase: https://energychain.github.io/tydids-validation/public/DataIdentity/ Scenario Experie...
Check Grant Status via REST API
This document describes a simple REST API call to check the revocation status of a specific ident...